allows people the freedom of working anywhere a signal can be received

ideal for networks in old listed buildings where cables would not be allowed to be installed

global set of standards - you can use wifi all over the world

heath and safety - tidier desktop with no trailing cables

Advantages of hard wired network

Faster, more reliable, more secure

Bluetooth

a wireless technology that transmits radio signals over short distances among mobile phones, computers, and other devices. it eliminates the needs for wires, docking stations or cradles

Connecting to a wireless network

You need the SSID name of the wireless networkYou need the wireless key (password)

Using GPS to monitor workers

You can track their location to help planning and communicationEmplyees may be unhappy about being tracked

Why do call centres record phone calls?

In case there are problemsFor training purposes

Data validation

A check that the data fits the right format (it may still be incorrect!)Example: DD/MM/YY - you cannot enter letters or enter an impossible date such as 34/13/12

Use of a bar code reader

Scanning goods at a supermarket

Optical Character Recognition (OCR)

converts handwritten or printed text into an electronic document

Near Field Communication(NFC)

a wireless technology designed for short distances aimed at using mobile phones for secure wireless payments

Radio Frequency Identification (RFID)

Uses small chips to track goods or animals

Why use automatic data capture?

Can be used in hazardous placesCan work for longer periods

But...it can be costly

File format.doc

a document used by Microsoft Word

File format.html or .php

Used for a web pageCreated by web authoring software (e.g. Adobe Dreamweaver) and viewed using a web browser

File format.psd

An image file type used by Adobe PhotoShop

File format.ppt

A Microsoft PowerPoint presentation

File formats .jpg or .gif

Used for imagesEditted with Adobe PhotoShop or Adobe Fireworks

File format.xls

A spreadsheet used by Microsoft Excel

File format.mdb or .accdb

Used by database software such as Microsoft Access

File format.mp3 or .wav or .wma

used for audio filesplayed with Windows Media Player

File format.pdf

Portable Document Format is a document (usually created using Adobe Acrobat)

File format.avi or .wmv

Video files played by software such as Windows Media Player

File format.txt

A text file that is created and read by software such as notepad

Proprietary file formats

The file type is owned by a company and can only be used or accessed by people with certain softwareExamples: .doc (Microsoft), .fla (Adobe), .aac (Apple), .xls (Microsoft), .wma (Microsoft), .ppt (Microsoft)

Open file formats

Can be accessed and used by anyoneExamples: txt, rtf, pdf, csv, mp3

Advantages of proprietary software

More professional supportRegular updates

Length check

To check data has the required lengthExample: password needs to be at least 6 digits long

Format check

Example: A date must be in the right format such as DD/MM/YYYY

Presence check

Example: a telephone number field must not be left blank

Range check

Checks data fits between a certain rangeExample: age may need to be between 18 and 25

Data validation

Checks that data entered is in the correct format (not necessarily correct!)Without it, the data could be totally wrong format and unusable

Local Storage

storage located in a computer such as a hard drive

Portable storage

Storage that can be moved from one computer to anotherExample: USB memory stick

Remote storage

Storage well away from the computerExample: Cloud storage where you can access the files from any device with an Internet connection

Data security: software methods

Use user accounts (username and password)

Use access rights (e.g. administrator rights)

Use file permissions (e.g. 'read only')

Data security: Physical methods

CCTV

Security guards

Key cards

Number locks

Attach computers to desks

A good password is...

A random mixture of letters, numbers and symbols that cannot be guessed easilyChanged regularly

Data encryption

Data is encrypted using a 'key'. This makes it unreadable unless you have the 'key' which tells you how to 'decrypt' it

Biometric security

Identifying someone by their physical characteristics

Examples: retina scan, finger prints

These are expensive but there is no need for a key that could be lost or stolen

3G

Mobile phone standard for high speed data transfer and video calling

ADSL

Enables an Internet connection over telephone lines using a modem

WiFi

Short range network for Internet access used in airports and cafes

4G

A new mobile phone standard that is faster and more secure

Fibre optic

Uses light pulses to send data rather than down wiresIt is much faster than using wiresExample: Virgin Media

Bandwidth

Is the amount of data that can be transferred in a certain time period

Usually measured in bits per second or megabytes per second

The higher the bandwidth the faster files can be transferred

File optimisation

Minimises the time needed to open or download a fileExample: compressing an image file to be used on the Internet by reducing the resolution or choosing another file type (such as .gif)

Backup and recovery

- Choose the right media (DVD, Cloud, magnetic tape etc.)- Decide how often to backup (daily, weekly etc.)- Archive old files that do not need to be backed up anymore as they do not change- Cost and ease of use are factors when choosing a solution

Business communication

Some methods: Website, email, video meetings, social networking, blog

Why? to keep customers aware of services, offers, closures as well as communicate with their own staff

SMS

Short Message Service(text messages!)

VoIP

Voice Over Internet ProtocolThis technology allows users to speak to other users over the Internet using their desktop computer, mobile computer, or mobile device. Sometime called Internet telephony

Example: Skype

Cloud-based service

Using web services to provide the functions usually carried out by a piece of software installed on the users computerExamples: Google docs, Prezi

Advantages of a cloud-based service

Files can be accessed remotely by any device that connects to the Internet

Files can be accessed and edited by many people at the same time (collaboration)

All these save time and costs

Document editing and review

Use 'comments' or 'track changes' in word processing software

Allows people to make suggestions or ask questions about a document

Data Protection Act 1998

Companies must abide by this act when storing personal data about customers. They must:

obtain customers' permission before giving out their data to other companies - often in small print

remove customers' personal data when it is no longer needed

have good security measures in place to prevent data being lost/stolen

Copyright, Designs and Patents Act 1988

Used to control images, text, audio or video

The copyright holder is in charge of how their work is used

Example: you may need permission or even pay a fee to use an image

Health and Safety legislation

Used to keep workplaces safe and healthy

RSI

Repetitive Strain Injury (RSI) caused by repeated actions such as pressing keys on a keyboard

It is prevented by using wrist rests and taking regular breaks

Health issues associated with using computers

Repetitive strain injury (RSI) - use a wrist rest and take regular breaks

An ethical issue is about what is right and wrong (morals)Think about what information should be kept private?

Cyberbullying

"Use of technology to deliberately and repeatedly harm other people"Examples: social networks such as Facebook, text messages- Victim can suffer anxiety or depression, a workplace could feel unsafe and morale drops (so more people are absent and leave)- You could monitor communication and block use to help solve the problem

Why do organisations monitor individuals?

For security purposes (eg CCTV)

To make the business work better (eg tracking a van using GPS)

Keylogging

Tracking the keys pressed by individual without their knowledge

Mobile phone triangulation

Uses which antennae a mobile phone is connected to so its position can be worked out

How do supermarkets monitor customers?

CCTV for security

Loyalty cards to monitor what customers buy and when they shop

Information Commissioner

the person responsible for enforcing the Data Protection Act. They also promote good practice and make everyone aware of the implications of the act

Data user

Someone who works with personal data

Data controller

Someone who determines how and why personal data is processed

Impact of data loss on a customer

They lose confidence in their company

There is a risk of identity theft

Impact of data loss on a company

Damage to reputation

Damage to profits

Increased costs to solve the problem

Impact of data loss on an employee

May be disciplined if they did not follow procedures

Could be demoted or sacked

DoS attack

A Denial of Service attack is where an attempt is made to block access to a website by real users

Lots of traffic is directed to the site until it is so busy that no real customer can access it

Hacking

Attempting to access a computer system without authorisation

Phishing

The use of an email scam or fake website to get people to give away their personal details (such as login information or credit card details)This can lead to money being stolen or identity theft

Manual software updates

Used to correct any software errors (bugs and fixes)

The user chooses when to downlaod and install the updates

Automatic software updates

Used to correct any software errors (bugs and fixes)

The update is automatic so does not need the user or download or install it